A security architecture for Tenet Scheme 2 Conference Paper uri icon

abstract

  • Springer-Verlag Berlin Heidelberg 1996. The bandwith requirements of interactive multimedia applications are exhaustive, causing network congestion to be a major problem. One way to deal with this problem is to use a resource reservation scheme, such as e.g. Tenet Scheme 2. This paper proposes a security architecture for Tenet Scheme 2. The basic ideas are to use Internet layer security protocols, such as the IP Security Protocol (IPSP) and Internet Key Management Protocol (IKMP), to establish authentic communication channels between RCAP daemons, to handle client authentication and authorization locally, and to use a proxy-based mechanism to distribute access rights for target sets and channels. The security architecture uses as its building blocks a collision-resistant one-way hash function and a digital signature system.

published proceedings

  • Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

author list (cited authors)

  • Oppliger, R., Gupta, A., Moran, M., & Bettati, R.

citation count

  • 0

complete list of authors

  • Oppliger, Rolf||Gupta, Amit||Moran, Mark||Bettati, Riccardo

editor list (cited editors)

  • Butscher, B., Moeller, E., & Pusch, H.

publication date

  • January 1996